[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Clustering Algorithm for Detecting and Handling Black Hole Attack in Vehicular Ad Hoc Networks

  • Conference paper
  • First Online:
Europe and MENA Cooperation Advances in Information and Communication Technologies

Abstract

A vehicular ad hoc network (VANET) basically consists of a group of vehicles that communicate with each other through a wireless transmission and requires no pre-existing management infrastructure. This communication, as the main objective, streamlining traffic for drivers. This exchange of information is not always reliable because of several constraints such as the existence of malicious users aimed falsifying information to serve their own interests. In this paper, we will simulate the Black Hole attack in a VANET environment with a generated real world mobility model using MOVE Tool and SUMO and analyse the performance of this communication under this attack. And then we propose a clustering algorithm to detect and react against the black hole attacker node.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chouhan, P., Kaushal, G., Prajapati, U.: Comparative study MANET and VANET. Int. J. Eng. Comput. Sci. 16079–16083 (2016)

    Google Scholar 

  2. Bibhu, V., Kumar, R., Kumar, B.S., Singh, D.K.: Performance Analysis of Black Hole Attack in Vanet, Int. J. Comput. Netw. Inf. Secur. 11, 47–54 (2012)

    Google Scholar 

  3. Sonia, S., Padmavati, P.:Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols. Int. J. Comput. Appl. 73(9), 0975–8887 (2013)

    Google Scholar 

  4. Khairnar, V.D., Pradhan, S.N.: Mobility models for vehicular ad-hoc network simulation. Int. J. Comput. Appl. 11 (4), 0975–8887 (2010)

    Google Scholar 

  5. Su, M.-Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 34, 107–117 (2011)

    Article  Google Scholar 

  6. Khana, U., Agrawala, S., Silakaria, S.: Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks. Proc. Comput. Sci. 46, 965–972 (2015)

    Article  Google Scholar 

  7. Singha, J.P., Balib, R.S.: A hybrid backbone based clustering algorithm for vehicular ad-hoc networks. Proc. Comput. Sci. 46, 1005–1013 (2015)

    Google Scholar 

  8. MOVE: http://www.cs.unsw.edu.au/klan/move/

  9. SUMO: http://sumo.sourceforge.net/

  10. The Network Simulator NS-2 version 2.35: http://www.isi.edu/nsnam/ns/index.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Badreddine Cherkaoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Cherkaoui, B., Beni-hssane, A., Erritali, M. (2017). A Clustering Algorithm for Detecting and Handling Black Hole Attack in Vehicular Ad Hoc Networks. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds) Europe and MENA Cooperation Advances in Information and Communication Technologies. Advances in Intelligent Systems and Computing, vol 520. Springer, Cham. https://doi.org/10.1007/978-3-319-46568-5_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46568-5_49

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46567-8

  • Online ISBN: 978-3-319-46568-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics